in MS-Excel__________ short cut key is used for hiding rows.
A. Ctrl+H B. Ctrl+7 C. Ctrl+9 D. None of the above
_________are attempts by individuals to obtain confidential information from you by falsifying their identity?
A. Computer viruses B. Phishing trips C. Phishing scams D. Spyware scams
Vendor-created program modifications are called ________ ?
A. patches B. fixes C. antiviruses D. holes
In the email dialogue box Bcc is used for writing the__________?
A. Subject B. Email Address C. Phone Numbers D. Names
In which graphics, digital photos and scanned images are typically stored with extensions such as.bmp, .png, .jpg, .tif or.gif?
C. Both Bitmap and Pixels
In IT, associative memory is called as__________?
A. Virtual memory B. Cache memory C. Content Addressable Memory D. Main memory
A number system that has eight different symbols to represent any quantity is known as…..?
Multi user systems provided cost savings for small business because they use a single processing unit to link several_________?
A. Personal Computer B. Workstations C. Dumb Terminals D. Mainframes
Who has been called the world’s first Lady computer programmer?
A. Ada Lovelace B. Allegra Byron C. Lady Augusta D. Allegra Noel-Byron
A set of raw, unprocessed facts, figures and symbols is called: